Infosec - Cyber Incident Response
- Offered byCoursera
Cyber Incident Response at Coursera Overview
Duration | 15 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cyber Incident Response at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 15 hours to complete
- English Subtitles: English
Cyber Incident Response at Coursera Course details
- The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.
- This course starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, and host analysis and forensics. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process.
Cyber Incident Response at Coursera Curriculum
Incident Response Fundamentals
The value of Incident Response and Fundamentals
The NIST five phases of Incident Response
Business Continuity and Disaster Recovery roles
Building an Incident Response playbook
Building an Incident Response team
Introduction to Incident Response
Incident Response Process
Incident Response Essential Components
Understanding Incident Response fundamentals
Stages of Incident Response
Incident definitions and severity criteria
Identifying threats and vulnerabilities
Incident Response assets inventory and identification
Incident identification
Incident Response classification levels
Communication/notification of an incident
Identification tools and techniques
Scoping containment efforts
Determining status of infected/affected computing resources
Containment actions
Containment tools and techniques
Who, What, When, Where?
Investigation data sources
The role of Digital Forensics
What is eradication?
Cleanup and verification
Notification
Eradication tools and techniques
Returning to normal business processes
Service and System restoration
Certification and validation of Business Continuity
Recovery and restoration tools and techniques
Assessing the team and processes' effectiveness
Implementing improvements
Feedback from other teams in the organization
Incident Response Stage 1: Preparation
Incident Response Stage 2: Identification
Incident Response Stage 3: Containment
Incident Response Stage 4: Investigation
Incident Response Stage 5: Eradication
Incident Response Stage 6: Recovery
Incident Response: Lessons Learned
Understanding Incident Response stages
Technical Deep Dive with Incident Response Tools
Network forensics with Zeek: http.log
Network forensics with Zeek: conn.log
Network forensics with Zeek: dns.log
Network forensics with Zeek: putting them together
Introduction to Wireshark
Network forensics with Wireshark
Memory forensics: extracting a memory dump
Memory forensics: extracting artifacts and IOCs with Volatility
Data breach/hacking incident: Investigation
Data breach/hacking incident: Containment
Data breach/hacking incident: Eradication/Validation
Live ongoing hacking incident: Detection/Investigation
Live ongoing hacking incident: Investigation/Containment
Incident Response Project Overview
Understanding the Incident Response process and tools
Project Quiz